This IP address has been reported a total of 876
times from 322 distinct
sources.
134.122.62.18 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Dec 2 11:16:14 ice2 sshd[2437623]: Invalid user bitrix from 134.122.62.18 port 49128
Dec 2 1 ... show moreDec 2 11:16:14 ice2 sshd[2437623]: Invalid user bitrix from 134.122.62.18 port 49128
Dec 2 11:23:07 ice2 sshd[2437643]: Invalid user mapr from 134.122.62.18 port 36196
... show less
Dec 2 11:26:16 backup sshd[510683]: Invalid user dbuser from 134.122.62.18 port 41360
Dec 2 ... show moreDec 2 11:26:16 backup sshd[510683]: Invalid user dbuser from 134.122.62.18 port 41360
Dec 2 11:40:15 backup sshd[510806]: Invalid user ftp from 134.122.62.18 port 43724
Dec 2 11:47:10 backup sshd[510892]: Invalid user ftp from 134.122.62.18 port 59062
Dec 2 11:54:07 backup sshd[510957]: Invalid user vagrant from 134.122.62.18 port 46128
Dec 2 12:01:03 backup sshd[511007]: Invalid user vagrant from 134.122.62.18 port 33194 show less
Brute-ForceSSH
Anonymous
Dec 2 10:24:52 de-fsn1-it2 sshd[715271]: Invalid user dbuser from 134.122.62.18 port 33974
De ... show moreDec 2 10:24:52 de-fsn1-it2 sshd[715271]: Invalid user dbuser from 134.122.62.18 port 33974
Dec 2 10:38:53 de-fsn1-it2 sshd[715645]: Invalid user ftp from 134.122.62.18 port 36338
Dec 2 10:45:48 de-fsn1-it2 sshd[715783]: Invalid user ftp from 134.122.62.18 port 51668
... show less
Dec 2 10:27:32 ice2 sshd[2437247]: Invalid user dbuser from 134.122.62.18 port 54930
Dec 2 1 ... show moreDec 2 10:27:32 ice2 sshd[2437247]: Invalid user dbuser from 134.122.62.18 port 54930
Dec 2 10:41:30 ice2 sshd[2437491]: Invalid user ftp from 134.122.62.18 port 57302
... show less
2024-12-02T11:25:26.490637+01:00 hyperion sshd[2089944]: pam_unix(sshd:auth): authentication failure ... show more2024-12-02T11:25:26.490637+01:00 hyperion sshd[2089944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18
2024-12-02T11:25:26.572933+01:00 hyperion sshd[2089944]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=dbuser
2024-12-02T11:25:28.594482+01:00 hyperion sshd[2089944]: Failed password for invalid user dbuser from 134.122.62.18 port 60786 ssh2
2024-12-02T11:32:24.768379+01:00 hyperion sshd[2090437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=root
2024-12-02T11:32:26.509432+01:00 hyperion sshd[2090437]: Failed password for root from 134.122.62.18 port 47852 ssh2
2024-12-02T11:39:26.208530+01:00 hyperion sshd[2090988]: Invalid user ftp from 134.122.62.18 port 34918 show less
Brute-ForceSSH
Anonymous
Dec 2 11:26:42 v2202305200205228941 sshd[1056434]: Invalid user dbuser from 134.122.62.18 port 4642 ... show moreDec 2 11:26:42 v2202305200205228941 sshd[1056434]: Invalid user dbuser from 134.122.62.18 port 46420
Dec 2 11:26:42 v2202305200205228941 sshd[1056434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18
Dec 2 11:26:44 v2202305200205228941 sshd[1056434]: Failed password for invalid user dbuser from 134.122.62.18 port 46420 ssh2
Dec 2 11:33:37 v2202305200205228941 sshd[1056439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=root
Dec 2 11:33:39 v2202305200205228941 sshd[1056439]: Failed password for root from 134.122.62.18 port 33486 ssh2
... show less
2024-12-02T10:26:06.004890+00:00 my-vps sshd[271125]: Invalid user dbuser from 134.122.62.18 port 43 ... show more2024-12-02T10:26:06.004890+00:00 my-vps sshd[271125]: Invalid user dbuser from 134.122.62.18 port 43280
2024-12-02T10:26:06.117829+00:00 my-vps sshd[271125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18
2024-12-02T10:26:08.297461+00:00 my-vps sshd[271125]: Failed password for invalid user dbuser from 134.122.62.18 port 43280 ssh2
2024-12-02T10:33:02.358625+00:00 my-vps sshd[271140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=root
2024-12-02T10:33:03.981539+00:00 my-vps sshd[271140]: Failed password for root from 134.122.62.18 port 58578 ssh2
... show less
2024-12-02T11:20:40.853208+01:00 srv03 sshd[2466714]: pam_unix(sshd:auth): authentication failure; l ... show more2024-12-02T11:20:40.853208+01:00 srv03 sshd[2466714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=root
2024-12-02T11:20:42.274943+01:00 srv03 sshd[2466714]: Failed password for root from 134.122.62.18 port 46354 ssh2
2024-12-02T11:27:41.075947+01:00 srv03 sshd[2471211]: Invalid user dbuser from 134.122.62.18 port 33420
... show less
sshd[3859819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rho ... show moresshd[3859819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18 user=root
sshd[3859819]: Failed password for root from 134.122.62.18 port 59074 ssh2
sshd[3868456]: Invalid user dbuser from 134.122.62.18 port 46142
sshd[3868456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.122.62.18
sshd[3868456]: Failed password for invalid user dbuser from 134.122.62.18 port 46142 ssh2 show less